[1] |
ROY S , ELLIS C , SHIVA S ,et al. A survey of game theory as applie ed to network se ecurity[C]// 43rd Hawaii Internationall Conference on Sy ystem Sciencess, 2010: 1-10.
|
[2] |
LIANG X , XIAO Y . Game ttheory for networrk security[J]. IEEE Communicattions Surveys & Tuutorials, 2013,15(1)): 472-486.
|
[3] |
VIDUTO V , HUANG W , MAPLE C . Toward op ttimal multi-objectiv ve models of neetwork security:suurvey[C]// 2011 17tth International Co onference on Auutomation & Compputing. 2011: 6-11.
|
[4] |
GORDON L , LOEB M , LUC YSHYN W ,et al. 2016 CSI/FBI computer crime aand security survey y[C]// 2016 Computter Security Institutte. 2016: 48-64.
|
[5] |
SERRA E , JAJODIA S , PUGLIIESE A ,et al. Paretto-optimal adversar rial defense off enterprise systems[J]. ACM Transacction on Informatioon& System Seecurity, 2015,17(3): 11.
|
[6] |
RICHARD L , JOSHUA W . Ana alysis and results off the DARPA off-lin ne intrusion deteection evaluation[C]// 17th Internationnal Workshop on Recent Advancees in Intrusion Detecction. 2015: 162-1822.
|
[7] |
EISENSTADT E , MOSHAIOV A , AVIGAD G . The e competing travellinng salespersons pproblem under multii-criteria[C]// 2016 14th International Co onference on Parrallel Problem Solviinng from Nature. 2016: 463-472.
|
[8] |
GORDON L , LOEB M . Budggeting process for information securiity expenditures[J]. Communication ns of the ACM, 2016,51(8): 395-406.
|
[9] |
WHITE J , PARK J S , KAMHOUA C A ,et al. Game theoretic attac ck analysis in oonline social network (OSN) services[C]// 2016 Intern national Conferrence on Social Nettworks Technologyy. 2016: 1012-1019.
|
[10] |
OCEVICIC H , NENADIC K , SOLIC K . Game thheory:active defen nse model and method[J]. IEEE Infformation and Network Security, 2016,51(8): 395-4006.
|
[11] |
LYE K W , WING J . Game straategies in networkk security[J]. Intern national Journaal of Information Seecurity, 2005,4(1/22): 71-86.
|
[12] |
林旺群, 王慧, 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2013,48(2): 3006-316.
|
|
LIN W Q , WANG H , LIU J H . Research on active defense technology in network securrity based on non-co ooperative dynamic game theory[J]. Jou urnal of Compuuter Research and De evelopment, 2013,488(2): 306-316.
|
[13] |
姜伟, 方滨兴, 田志宏 . 基于攻防随机博弈模 型的防御策略选取研究[J]. 计算机研究与发展, 2013,47(10): 1714-1723.
|
|
JIANG W , FANG B X , TIAN Z H . Research on d defense strategies sselection basedd on attack-defensee stochastic game model[J]. Journal of Computer Reesearch and Develo opment, 2013,47(1 0): 1714-1723.
|
[14] |
张恒巍, 余定坤, 韩继红 ,等. .基于攻防信号 博弈模型的防御策 略选取方法[J]. .通信学报, 2016,37(5): 39-49.
|
|
ZHANG H W , YU D K , HA N J H ,et al. Defennse policies selectioon method based on attack-defensse signaling game model[J]. Journal o on Communicattions, 2016,37(5): 339-49.
|
[15] |
王长春, 程晓航, 朱永文 ,等. 计算机网络对抗行动策略的Marko ov博弈模型[J]. .系统工程理论与实践, 2014,34(9): 2402-2410.
|
|
WANG C C , CHENG X H , ZHU Y W ,et al. A Ma arkov game model of computer nettwork operation[J]. .Systems Enginee rring -Theory & Pra actice, 2014,344(9): 2402-2410.
|
[16] |
MARTIN A N . Breakking the symmetry y between interacti ion and replaccement in evolutioonary dynamics onn graphs[J]. Physiccal Review Lettters, 2016(23): 24-333.
|
[17] |
LI P , DUAN H B . Rob bustness of cooperaation on scale-free n networks in the evolutionary prisooner’s dilemma game[J]. A Letters J Journal Explorring the Frontiers of Physics, 2014(1005): 12-19.
|
[18] |
孙薇 . 基于演化博弈论的信息安全 攻防问题研究[J]. 情报科学, 2015(9): 1408-1412.
|
|
SUN W . Research on atttack and deference i in information secur rity based on evollutionary game[J]. Innformation Science, 2015(9): 1408-1412.
|
[19] |
朱建明, 宋彪, 黄启发 . 基于系统动力学的网络安全攻防演化博弈模型[J]. 通信学报, 2014,35(1): 54-61.
|
|
ZHU J M , SONG B , , HUANG Q F . Evolution game moodel of offensse-defense for nettwork security based on system dyynamics[J]. Jourrnal on Communicaations, 2014,35(1): 54-61.
|
[20] |
黄健明, 张恒巍, 王晋东 ,等. 基于攻 防演化博弈模型 的防御策略选取方法[J]. 通信学报, 2017,38(1): 1668-176.
|
|
HUANG J M , ZHANG H W , WANG J D ,et al. Defense sttrategies selectiion based on attacck-defense evolutioonary game model[J]. Journal on Communications, 2017,38(1): 168-1776.
|
[21] |
SHEN S G , HUANG L J , FAN E ,et al. Trust dynamics in n WSN:an evol lutionary game-theeoretic approach[J]. Journal of Sens sors, 2016,32(44): 34-43.
|
[22] |
LI U F M , DING Y S . Dynamics analysis of evolutionary g game-based trus t computing for P2P networks[J]. Application Researc ch of Computeers, 2016,33(8): 2460-2463.
|
[23] |
FUDENBERG D , LE VINE D . Learningg in games[J]. Euroopean Economic Review, 1998,442(3-5): 631-639.
|
[24] |
GILBOA I , MATSUI A . Social stability aand equilibrium[J]. Econometricaa, 1991,59(3): 859-867.
|
[25] |
DREW F , JEAN T . Ga ame theory[M]. Booston: Massachusetttes Institute of Technology Press, 2012.
|
[26] |
BERGER U , HOFBA UER J . Irrational beehavior in the Bro wn-von Neumannn-Nash dynamics[J]. Games and Econoomic Behavior, 2006,56(1): 1-6.
|
[27] |
SMIITH M J . Stabilityy of a dynamic moodel of traffic assi gnment-An appllication of a methood of Lyapunov[J]. Transportation Scie ence, 1984,18(33): 245-252.
|
[28] |
GU O H , WANG X W , , CHENG H ,et al. A routing defense mechanism usinng evolutionary ga me theory for delay y tolerant networks[[J]. Applied Sofftt Computing, 2016(38): 469-476.
|
[29] |
TAYLOR P D , JONK ER L B . Evolutionaary stable strategie s and game dynnamics[J]. Mathemaatical Biosciences, 1978,40(1/2): 145-156.
|
[30] |
LEE W K , FAN W , M IILLER M ,et al. Toward cost-sensitive modeling for intruusion detection and response[J]. Journaal of Computer Sec curity, 2002,10(1-2): 5-22.
|
[31] |
BO RKOVSKY R N , DORASZELSKI U , KRYUKOV Y . A user’ s guid de to solving dyna amic stochastic games using the ho motopy methodd[J]. Operation Ressearch, 2015,58(4): 1116-1132.
|